Security Awareness Checklist for Local Government

| | Security Awareness
Local government is an umbrella term that covers a variety of entities. These entities include jails, courts, police departments, local Social Security offices, social services, public transportation... Go on to the site to read the full article ... Read More

Penetration Testing for a Company Vs. Being Freelance

Introduction The Cybersecurity job market has become a hot field, seeking new, highly qualified candidates. It is a diverse field with various job types, but one of the most desired positions is... Go on to the site to read the full article ... Read More

Building Effective Defense with the Phishing Kill Chain

| | Security Awareness
What is the Phishing Kill Chain? Many people have heard of the cyber kill chain, but what about the phishing kill chain? Like the cyber kill chain, this model of phishing attacks can be used to help... Go on to the site to read the full article ... Read More

DoD 8570 IAM Certification – Level I

| | General Security
What is the DoD IAM Level 1? The Department of Defense (DoD) directive 8570 provides guidance on how the DoD workforce manages and executes Information Assurance (IA) functions. IA Technical (IAT)... Go on to the site to read the full article ... Read More

DoD IASAE Overview

| | DoD 8570
What is the DoD IASAE? The U.S. Department of Defense (DoD) IASAE covers the requirements for the Information Assurance architecture and engineering areas (IA System Architects and Engineers) as... Go on to the site to read the full article ... Read More
The Advantages & Disadvantages of Outsourcing Incident Response

The Advantages & Disadvantages of Outsourcing Incident Response

Companies usually outsource tasks if they are more cost effective and can produce consistent results. Outsourcing incident response functions ensures a company will get consistent, reliable results... Go on to the site to read the full article ... Read More
A 10 Step Post-Breach Incident Response Checklist

A 10 Step Post-Breach Incident Response Checklist

Introduction Any organization with cyber-related assets needs to have a well written incident response (IR) plan. The incident response plan is meant to cover the procedures needed to protect,... Go on to the site to read the full article ... Read More